This shift towards adaptive and situational access controls creates a whole new problem, and that problem is at the system level. With basic authentication schemes the primary vulnerability of the authentication system was the theft of the password database and we have all seen news stories of these databases being breached. In a more sophisticated, more contextual authentication model the amount of highly sensitive and critical data that needs to be protected is much higher and includes private and personal data such as location, usage patterns, entitlements as well as biometrics. For this reason, it is crucial to ensure that back end systems such as decision engines, big data analytics and storage systems are secured with the highest possible protection. Authentication is not just about the user but about the entire system. If one element fails, the entire chain can be compromised and all other security measures rendered useless.

It is easy to get carried away amidst all the hype around emerging authentication schemes and devices – ultimately whatever means of authentication is used will only be as strong as the technology securing the back-end. Authentication data is highly treasured and will work its way up cyber criminals’ agendas as it gives access to increasingly sensitive and personal information. The key to minimising risk of compromise is to encrypt all authentication data, securing the critical keys and cryptographic processes from physical and logical tampering. After all, your biometric data is meant to belong to you only.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.